TRAINING

RPI Group Training provides superior information technology and cybersecurity training integration for our clients. Through our unique relationships with several of the top training organizations and top independent trainers in the industry, RPI clients receive the highest quality, integrity-based and most cost effective training and personnel qualification solutions available today.

LOCATIONS  |  COURSE LIST  |  QUALIFICATIONS & CERTS  |  Testimonials

 

RPI GROUP CORPORATE OFFICE

10718 Ballantraye Dr., Suite 410

Fredericksburg, VA 22407

 
 

University of Mary Washington

4224 University Dr.

King George, VA 22485

STAFFORD CORPORATE CENTER

525 Corporate Center Dr.

Stafford, VA 22554

 
 

LittleTon, CO LOCATION

5912 S. Cody Street, Suite 210
Littleton, Colorado 80123

 
 

San Diego, CA Location

14765 Via Bettona
San Diego, CA 92127

 

Professional Certification & Accreditation Courses

  • Certified Information System Security Professional (CISSP) Review
  • System Security Certified Practitioner (SSCP) Review
  • Certified in Risk and Information Systems Controls (CRISC) Review
  • Certified Authorization Professional (CAP) Review
  • Certified Information Security Manager (CISM) Review
  • Certified Information Security Auditor (CISA) Review

Cloud Technology and Security

  • Cloud Technology Associate
  • Cloud Business Associate
  • Professional Cloud Administrator
  • Professional Cloud Developer
  • Professional Cloud Security Manager
  • Professional Cloud Service Manager
  • Professional Cloud Solutions Architect
  • Executive FedRAMP Credential
  • CompTIA Cloud Essentials
  • CompTIA Cloud+

Project Management

  • Project Management Professional (PMP)
  • CompTIA Project+

CompTIA Courses

  • CompTIA Advanced Security Practitioner (CASP)
  • CompTIA Security+
  • CompTIA Network+
  • CompTIA A+
  • CompTIA Healthcare IT Technician
  • CompTIA Cloud Essentials
  • CompTIA Cloud+
  • CompTIA Project+

 

 

EC-COUNCIL

  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)
  • Certified Incident Handler (CIH)
  • Certified Chief Information Security Officer (C|CISO)

INSIDER THREAT

  • Insider Threat Professional

INFORMATION ASSURANCE ROLES & RESPONSIBILITIES

  • Senior Systems Manager (CNSS 4012)
  • Information Assurance Officer (CNSS 4014)
  • Information System Certification Agent (NSTISSI 4015)
  • National Information Assurance Standards for Risk Analyst and the Risk Management Framework (RMF) (CNSS 4016)

Certified Risk Management Framework Training

  • Department of Defense Risk Management Framework (RMF)
  • National Information Assurance Standards for Risk Analyst and the Risk Management Framework (RMF) (CNSS 4016)

ITIL Training Courses

  • ITIL v3 Foundation
  • ITIL v3 Service Operations Intermediate
  • ITIL Service Capability: Operational Support and Analysis
  • ITIL Service Capability: Planning, Protection and Optimization
  • ITIL Service Capability: Release, Control and Validation
  • ITIL Service Capability: Service Offerings and Agreements
  • ITIL Service Capability: Continual Service Improvement
  • ITIL Service Lifecycle: Service Design
  • ITIL Service Lifecycle: Service Operation
  • ITIL Service Lifecycle: Service Strategy
  • ITIL Service Lifecycle: Service Transition

WIRELESS TRAINING

  • Certified Wireless Technology Specialist
  • Certified Wireless Network Administrator
  • Certified Wireless Security Professional
  • Certified Wireless Design Professional
  • Certified Wireless Analysis Professional

Red Hat Training Courses

  • RH124–System Administration I
  • RH134–System Administration II
  • RH200–RHCSA® Rapid Track Course with Exam
  • RH255–System Administration III with RHCSA and RHCE Exams

Advanced & Specialized Cybersecurity Training

  • Network Exploitation Analyst & Operator
  • Cyber Attack & Defend
  • Mobile Device Forensics
  • Cyber Intelligence
  • Basic Digital Media Forensics
  • Advanced Digital Media Forensics
  • SNORT Fundamentals
  • Wiretap–Network Analysis
  • Information Operations (Manager’s Edition)
  • Wireless Assessment & Exploitation
  • Cybersecurity Compliance and Mobility
  • Cybersecurity Investigations and Network Forensics Analysis: Practical
  • Techniques for Analyzing Suspicious Network Traffic

ISC2

  • CAP - Certified Authorization Professional
  • SSCP - System Security Certified Professional
  • CISSP - Certified Information Systems Security Professional
  • ISSAP - Information System Security Architecture Professional
  • ISSEP - Information System Security Engineering Professional
  • ISSMP - Information System Security Management Professional

ISACA

  • CISM - Certified Information Security Manager
  • CISA - Certified Information Systems Auditor
  • CRISC - Certified in Risk and Information System Control

 

 

 

EC Council

  • CEH - Certified Ethical Hacker
  • CHFI - Computer Hacking Forensic Investigator
  • ECSA - Certified Security Analyst
  • LPT - Licensed Penetration Tester
  • C|CISO - Certified Chief Information Security Officer
  • E|DRP - Disaster Recovery
  • E|CIH - Incident Handling
  • PMITS - Project Management in IT Security

MISC

  • Penetration Testing with BackTrack
  • Metasploit
  • Wireless Hacking
  • Six Sigma Green Belt
  • SNORT

CompTIA

  • CASP 
  • Security+
  • Network+
  • A+
  • Linux+ / LPIC1

SECURITY CERTIFIED

  • SCP-Tactical Perimeter                  
  • SCP-Strategic Infrastructure        

 

NSA

  • IAM - INFOSEC Assessment Methodology
  • IEM - INFOSEC Evaluation Methodology

CISCO

  • CCDA 
  • CCNA 
  • CCNP 
  • CCIE

SANS/GIAC

  • GWAN - Wireless
  • GCIH - Certified Incident Handler
  • GSEC - Security Essentials Certified
  • GCFW - Certified Firewall Analyst

MICROSOFT

  • MCT
  • MCITP
  • MCSE 
  • MCP
  • MCS

RPI TEAM TRAINING

  • The training I received here was top notch.  I feel very confident in my abilities to go and pass the CISM exam.
  • Coming into the course I was skeptical, but the course [CISM 1] has been valuable, not only because of its direct impact on my ability to obtain CISM, but also because it will have an impact on how I conduct my daily routine/activities.
  • It helped clear up questions I already had, now I feel like a more skillful technician.
  • Relates to my job hand in hand, I feel very confident going back to work now.
  • After this training I can say with confidence I will have more experience and knowledge in my job.
  • This class opened my eyes to the larger picture at the MCNOSC. It helped me gain a stronger understanding of how we are structured and operate.
  • I enjoyed stories that related subject matter to real world events.  I would like to see similar courses offered in the future.
  • Best Security+ training I have attended.  Instructor did not use slides and kept all learning focused.
  • The class was highly informative, interactive and enjoyable. It was much easier to obtain the information when the material was covered in a way that captured your attention.
  • The training provided insight into things that I work with on a daily basis as well as a lot of new information which could be extremely helpful in future IT based occupations.

LEO DREIGER, INSTRUCTOR

  • Leo is an excellent instructor.  He applies real life situations into the course.  He also does not read every line of the slide show, which is helpful.
  • Leo is very, very knowledgeable and helpful. Someone that takes personal time to help is someone that practices being a good person.
  • Top notch instructor because he teaches and doesn’t preach. Not scripted, he adjusts to the needs of the class.
  • High level management type knowledge that can be very convoluted or difficult to understand, but instructor kept it in context. Provided ways to remember/learn key topics and ensured class stayed caught up so no one fell behind.
  • This class was not PowerPoint torture, which is important when it comes down to retaining the information.  Instructor took time to get to know certain things about all of us.
  • (Training) Above average.  I often feel I can school the instructors in IT classes.  Surprisingly refreshing not to feel that way.
  • Rather than focus just on making sure we got information just for the cert, Leo made sure that he gave us more info that broadened our knowledge for civilian work and for future work
  • The training given was not death by PowerPoint so I definitely feel it was effective.
  • Excellent training provided by Leo.  He constantly tried to show us the ‘on-hands’ way of teaching the material.
  • Coming into the class I was unsure on how I was going to retain the information, but Leo broke everything down to a level I would understand.
  • Leo is very knowledgeable in the IT field and doesn’t mind going the extra mile. His success can become someone else’s inspiration the way he teaches.
  • I just want to thank you for actually teaching me this.  I didn’t have too much confidence in getting the cert prior to Monday.
  • The instructor not only knew all the material but has hands on experience with nearly all aspects.

  • The training is perfect for the job I perform.
  • The instructor’s knowledge is by far superior to any instructors I’ve had.
  • One of the best hands-on training I’ve attended.

Phillip Shade, Instructor


  • This is what he does for a living and he has worked from the bottom to the top of the IT field.
  • One of the first courses that captivated my attention.  Excellent instructor and layout of course materials.
  • I liked how the instructor brought personal experiences and applied it to the course. Excellent.

Rich Westfield, Instructor


  • This class and instructor was outstanding, I’m learning so much about Server 2012.

Kevin Brown, Instructor

 

SELF-PACED & FREE COURSES

RPI Training also offers many Self-Paced and Free Courses! For more information on our Self-Paced Course, click the button below. 


WANT MORE INFORMATION ON TRAINING CLASSES?

Please complete the form below

Name *
Name